2021
DOI: 10.1109/tcomm.2021.3103244
|View full text |Cite
|
Sign up to set email alerts
|

Age of Information Minimization for Grant-Free Non-Orthogonal Massive Access Using Mean-Field Games

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 33 publications
(18 citation statements)
references
References 33 publications
0
18
0
Order By: Relevance
“…Similar approach follows for the expected system throughput. In Lemma 2, after substituting 𝑞 𝑂 𝑖 , 𝑝 𝑁 1→2 and 𝑝 𝑁 2→1 from ( 5) and ( 6), respectively, into (3) and ( 4), and further simplifying, we can obtain (7) and (9), respectively. The proof of Corollary 2.1 follows from Lemma 2 as lim 𝜌→∞ Γ 𝑆 = 1 2 and lim 𝜌→∞ Γ 𝐴 = 1 2 and the exponential functions in Γ 𝑆 and Γ 𝐴 have monotonic behaviour in 𝜌.…”
Section: Proof Outlinesmentioning
confidence: 99%
“…Similar approach follows for the expected system throughput. In Lemma 2, after substituting 𝑞 𝑂 𝑖 , 𝑝 𝑁 1→2 and 𝑝 𝑁 2→1 from ( 5) and ( 6), respectively, into (3) and ( 4), and further simplifying, we can obtain (7) and (9), respectively. The proof of Corollary 2.1 follows from Lemma 2 as lim 𝜌→∞ Γ 𝑆 = 1 2 and lim 𝜌→∞ Γ 𝐴 = 1 2 and the exponential functions in Γ 𝑆 and Γ 𝐴 have monotonic behaviour in 𝜌.…”
Section: Proof Outlinesmentioning
confidence: 99%
“…In this network, these IoT devices are monitoring environmental conditions and needs to update these information to the UAV in a real‐time manner since potential delay might cause severe damage. Therefore, IoT devices will transmit the generated data packet to the UAV immediately [23]. The UAV owns K orthogonal channels, denoted by scriptK=false{1,,Kfalse}$\mathcal {K} = \lbrace 1, \ldots , K\rbrace$, to support the massive access of these IoT devices.…”
Section: System Modelmentioning
confidence: 99%
“…With these notations and observations, we can have the following proposition in terms of the outage probability according to ref. [23]. Proposition When the number of IoT devices over channel k is Ck$C_k$, the expected number of interfering packets to one packet can be written as Ikbadbreak=2TpTsTpCk.\begin{equation} I_k = \frac{2T_p}{T_s - T_p} C_k.…”
Section: System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Physical layer network coding enabled NOMA has been proposed in [5] to minimize AoI. In contrast to these works, [6] and [7] have proposed AoI-independent scheduling schemes for NOMA in decentralized setting of slotted ALOHA and grant-free massive access, respectively.…”
Section: Introductionmentioning
confidence: 99%